Below we explain terms that we use in our privacy policies. You can find further explanations of IT security terms in our lexicon. explanations of IT security terms.
In affiliate marketing, networks of advertising and advertising space providers work together via one platform. As a rule, payment is made through performance-based commissions.
By modifying the data, identification of a natural person is no longer possible.
Data stored about the user's activities.
Programs allowing analyses of user behavior.
Use of IT infrastructure and services that are not kept with data controllers (locally) but are hired as a service from third parties and can be accessed via a network (e.g. the internet).
Cookies are small text files that are stored on your computer or in your browser.
General Data Protection Regulation, revision of data protection regulations for the European Union (EU 2016/679).
A fan page describes, among other things, the presence of a person in public life or a company in social networks.
(Portable) electronic objects/computers, such as smartphones, tablets, laptops, or PCs, used to access apps or programs and information services.
An address within the computer network based on the Internet Protocol (IP). This address is assigned to the device and thus allows the device to be addressed and so accessed.
Internet of Things is a collective term for technologies that enable physical and virtual objects to be networked and work together.
An address within the computer network based on the Internet Protocol (IP). This address is assigned to a device and enables the device to be addressed and thus accessed.
The Like button helps users of social networks to express in a simple way that they like or support something.
Hardware address of each individual network adapter.
Metadata is data that is available in a structured form and provides information about characteristics of other data. In the case of a photo, for example, this can be information about the aperture value, shutter speed or geo-tags.
Administration area within the Avira software for registered users.
This information relates to a specific or identifiable natural, living person.
Modification of data in such a way that it is no longer possible to allocate it to a certain data subject without additional supplementary information.
"Software as a Service" providers provide their customers with their software and services via the cloud.
Programs developed to cause damage to a device.
Synonymous for "intelligent, clever" devices (e. g. smartphone, smart TV, smart watch).
(Service Set Identifier) freely selectable network name of a Wi-Fi network.
The person responsible in terms of data protection law determines the means and purposes of processing personal data.